Computer Hardware & Software

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
full-widthPodcast
1
Card Sorting

1/153

flashcard set

Earn XP

Description and Tags

Flashcards for computer architecture terminology and concepts, aiding in understanding the key elements and processes involved.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

154 Terms

1
New cards

CPU

Responsible for executing instructions and processing data.

2
New cards

Microprocessor

An integrated circuit containing the functions of a computer's central processing unit.

3
New cards

Von Neumann Architecture

A computer architecture that describes a system where the CPU, memory, and I/O are separate and instructions and data are stored in memory.

4
New cards

ALU

Performs arithmetic and logical operations.

5
New cards

CU

Coordinates the operations of the computer's processor, managing data flow and instruction execution.

6
New cards

Registers

Small, fast storage locations within the CPU for holding temporary data and instructions.

7
New cards

Program Counter (PC)

Register that holds the address of the next instruction to be executed.

8
New cards

Memory Address Register (MAR)

Holds the memory address from which data is to be fetched or to which it is to be written.

9
New cards

Memory Data Register (MDR)

Holds the data that is being transferred to or from the memory.

10
New cards

Current Instruction Register (CIR)

Holds the instruction currently being executed.

11
New cards

Accumulator (ACC)

Stores intermediate results of arithmetic and logic operations.

12
New cards

Buses

Sets of parallel wires used to connect different components of a computer.

13
New cards

Address Bus

A unidirectional bus that carries information about the address of data.

14
New cards

Data Bus

A bidirectional bus that carries actual data between the CPU and memory.

15
New cards

Control Bus

A bidirectional bus that carries control signals between components.

16
New cards

Fetch-Decode-Execute Cycle

The cycle in which the CPU fetches an instruction from memory, decodes it, and executes it.

17
New cards

Instruction Set

The complete set of machine language instructions that a processor can execute.

18
New cards

Embedded Systems

Computer systems designed to perform dedicated functions within larger systems.

19
New cards

System Clock

Controls the timing of all operations in the CPU.

20
New cards

Cache Memory

A smaller, faster type of volatile memory that provides high-speed data access to the CPU.

21
New cards

Overclocking

Increasing a CPU's clock speed beyond its rated limits to enhance performance.

22
New cards

Underclocking

Reducing a CPU's clock speed to decrease power consumption and heat.

23
New cards

Cores

Independent processing units within a CPU that can execute tasks simultaneously.

24
New cards

Dual-core Processor

A CPU with two independent cores for processing multiple tasks.

25
New cards

Quad-core Processor

A CPU with four independent cores for enhanced multitasking.

26
New cards

Motherboard

The main circuit board in a computer that holds the CPU, memory, and other essential components.

27
New cards

ROM

Non-volatile storage that retains data even when powered off that stores start-up routines and boot up files.

28
New cards

RAM

Volatile storage used for temporary data while a computer is running.

29
New cards

Networking Devices

Hardware that connects computers and manages data traffic between them.

30
New cards

Router

A device that forwards data packets between networks, directing traffic.

31
New cards

Switch

A device that connects devices within a local area network (LAN) and filters data traffic.

32
New cards

IP Address

A unique address that identifies the location of  a device on a network.

33
New cards

Dynamic IP Address

An IP address that is assigned temporarily and can change with each connection.

34
New cards

Static IP Address

A permanent IP address that does not change.

35
New cards

NIC

Allows a device to connect to a network that has MAC address.

36
New cards

VPN

Creates a secure connection over a public network.

37
New cards

DNS

Translates domain names to IP addresses.

38
New cards

Backup

Making copies of data to protect against data loss.

39
New cards

Boot Process

The sequence of events that occurs when a computer is powered on and loads the operating system.

40
New cards

Firmware

Permanent software programmed into a read-only memory.

41
New cards

Malware

Malicious software designed to harm or exploit any programmable device or network.

42
New cards

Validation

An automatic computer check to ensure that data entered into a system is sensible, reasonable, and meets the program's requirements.

43
New cards

Operating System (OS)

Software that manages hardware and software resources of a computer.

44
New cards

Database

Organized collection of data that can be easily accessed, managed, and updated.

45
New cards

Software Application

A program designed to perform specific tasks for the user.

46
New cards

Peripheral Devices

External devices connected to a computer to provide input or output.

47
New cards

User Interface (UI)

The means by which a user interacts with a computer or software.

48
New cards

Voice Recognition

The capability of a machine to identify and respond to human voice inputs.

49
New cards

Artificial Intelligence (AI)

Simulation of human intelligence processes by machines.

50
New cards

Cloud Computing

Delivery of computing services over the internet, including storage, processing power, and software.

51
New cards

Data Encryption

The transformation of data into a secure format that is unreadable without a key.

52
New cards

Web Browser

Software application for accessing information on the World Wide Web.

53
New cards

HTTP

Hypertext Transfer Protocol, used for transmitting hypermedia documents on the web.

54
New cards

HTTPS

Secure version of HTTP, encrypted for secure communication over a computer network.

55
New cards

Bandwidth

The maximum rate of data transfer across a network.

56
New cards

Latency

The delay before a transfer of data begins following an instruction.

57
New cards

Web Server

A server that hosts websites and delivers web pages to clients.

58
New cards

File Transfer Protocol (FTP)

A standard network protocol for transferring files from one host to another.

59
New cards

PRIMARY STORAGE

Part of the computer system the CPU can directly access and for storing data and programs in use.

60
New cards

Data Loss

The loss of data due to corruption, deletion, hardware failure, or natural disasters.

61
New cards

Data Recovery

The process of restoring lost, inaccessible, or corrupted data.

62
New cards

Computer Virus

A type of malicious software that replicates itself and spreads to other computers using an active host.

63
New cards

Phishing

Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity usually mailed with an attachment .

64
New cards

Firewall

A network security system that monitors and controls incoming and outgoing network traffic.

65
New cards

Access Control

A security technique that regulates who or what can view or use resources in a computing environment.

66
New cards

Cybersecurity

The practice of protecting systems, networks, and programs from digital attacks.

67
New cards

Data Integrity

The maintenance of the accuracy and consistency of data over its lifecycle.

68
New cards

Verification

The process of ensuring data is entered into a system accurately and without errors

69
New cards

Latency

The time delay experienced in communication over a network.

70
New cards

Double Entry Check

A data verification method where information is entered twice and compared by the computer.

71
New cards

Encryption Algorithms

Mathematical formulas used to encrypt data.

72
New cards

Virtualization

Creating a virtual version of a resource, such as a server or storage device.

73
New cards

Length Check

Data validation method that verifies the number of characters in a user's input to ensure it meets a specific criterion, such as a minimum or maximum length

74
New cards

Range Check

Verifies that a numeric input is within a specified minimum and maximum value.

75
New cards

Records in DB

No of data rows in a table that contains the complete information about the entity.

76
New cards

CCD

s

Sensor that converts light into electrical charges

77
New cards

Software Development Life Cycle (SDLC)

A process for planning, creating, testing, and deploying software.

78
New cards

Prototyping

An early sample, model, or release of a product to test concepts.

79
New cards

Format Check

Ensures input data adheres to a specific pattern or structure

80
New cards

Presence check

Verifies a user has entered data into a required field and that the field is not left blank.

81
New cards

Industry Standards

Established norms or requirements about technical systems.

82
New cards

Type Check

Ensures the data entered into a field matches the required data type for that field. 

83
New cards

RSI

Repititove Strain injury resulting from repetitive motion or overuse of muscles. stain causing pain or discomfort.

84
New cards

Check Digit

A single digit added to the end of a sequence of numbers (such as a barcode, ISBN, or account number) that is calculated using a specific algorithm applied to the other digits in the sequence.

85
New cards

Artificial Neural Networks

Computing systems inspired by the biological neural networks.

86
New cards

Integer

Used to store whole numbers (positive, negative, or zero) that do not have a fractional or decimal part. 

87
New cards

Digital Signature

A mathematical scheme for verifying the authenticity and integrity of a message.

88
New cards

Data Breach

A security incident where unauthorized access to sensitive data happens.

89
New cards

Real

A numerical data type used to store numbers that have a fractional or decimal component.

90
New cards

String

A data type used in programming to represent a sequence of characters, such as letters, numbers, symbols, and spaces

91
New cards

Character

Used to store a single character

92
New cards

Boolean

Can store one of only two possible values: TRUE or FALSE

93
New cards

SELECT - SQL

DML command used to retrieve data from one or more tables within a relational database.The SELECT statement allows users to specify which columns of data to return, apply conditions, and sort results.

94
New cards

SQL - WHERE clause

Used to filter records, allowing a query to extract, update, or delete only those rows that fulfill a specified condition or set of conditions. I

95
New cards

SQL - ORDER BY clause

Used to sort the result set of a SELECT query based on one or more specified columns.

96
New cards

SQL - SUM

An aggregate function used to calculate the total sum of all non-NULL numeric values in a specified column or expression within a database table.

97
New cards

SQL - COUNT

An aggregate function that returns the number of rows that match a specified criterion.

98
New cards

AND Gate

A basic digital logic gate that outputs true or high only if all of its inputs are true or high.

99
New cards

OR Gate

A basic digital logic gate that outputs true or high if at least one of its inputs is true or high.

100
New cards

NOR gate

A digital logic gate that outputs true or high only if all of its inputs are false or low.